Respond to each seperatly with 100-150 words attached


READ EACH POST AND RESPOND TO EACH SEPERATLY WITH 100-150 WORDS.

YOUR TASK READ AND RESPOND WITH DISCUSSION, RESPOND TO EACH WITH 100-150 WORDS AND 2 REFERENCES. DO THEM SEPARRATLY BUT ON SAME DOC.

Professor:

Please reseach more about information security policies. what information do you believe signifies that Pakistan is one of the greatest security threats to the United States? Regarding how our limited resources our effectively utilized it is important to note that many of the actions we use to fight the war on drugs are applicable to the war on terror. For example the resource we expend on border security have direct applicability to both hence it might not always be necessary to select or earmark what the money is anticipated for use when it has applicability to multiple causes.

Minera:

An information security policy is a combination of principles, regulations, methodologies, techniques and tools established to protect the organization from threats. These policies also help organizations to identify its information assets and define the corporate attitude to these information assets.

Information-security risk management is the overall process that integrates the identification and analysis of risks to which an organization is exposed, it provides an assessment of the potential impact on the business, and enables a decision regarding the action to be taken so as to eliminate or reduce the risk to an acceptable level.

Risk is a combination of the threats to one or more vulnerabilities, leading to a negative impact that is detrimental to one or more of the assets, risk management also establishes the basic security elements: assets, owner of the assets, threats, vulnerabilities, risks and measures (Bojanc & Jerman-Blazic, 2013).

Enterprise risk management is a process of managing exposure of uncertainties with emphasis on identifying, controlling, and eliminating or minimizing events that could possibly prevent business goals from being achieved. Identifying and evaluating information assets, completing assessments of the effects of security incidents, and the assessment of a likelihood of successful attacks on information systems, and a business assessment of the costs and benefits of an investment in security solutions (Bojanc & Jerman-Blazic, 2013). The risk-management process usually consists of two main stages: risk assessment, which identifies and evaluates the vulnerabilities and threats for each information asset and calculates the probability of an incident and the loss due to a security incident. The second is the risk treatment, which selects an appropriate treatment for each assessed risk. Then there is the comparison of the selected security measures and an economic analysis of the profitability of each measure.

It will be necessary to find the best relationship between costs and security. The costs of information security are represented by two components that are interconnected: the first is cost of implementing a measure (cost) which is the money an organization spends on an investment with which it reduces the security risk. The second is the costs of the incident (risk). This component increases by increasing the security of the system. Finding the optimum level of security that takes into account the cost of the incident and the costs of the measure is not an easy task. In order to determine the optimum level of information security, a cost benefit analysis is often required. The level of security or the protection you will get depends on how much money you will spend. The budget needs to be adequate, without a proper budget, organizations won't be equipped with sufficient resources to ensure information security, money will bring software, hardware, and consultants to achieve successful implementation of information security.

Personally I do not believe terrorist threats will cease anywhere, it seems there are new cell groups that develop and they target anyone who is not in agreement with how they want to do things, if you are fighting for a cause that is not on their belief you're dead. We see this every day when we turn on the news, the best example is the most recent of heinous crimes being committed by ISIS. The U.S President does not deal with terrorist and will not send money. I don't think we are over reacting or over- prioritizing this fight. We were attacked and now we have to watch over our shoulders at all times, we have to watch what we say and who we say things to. If keeping us protected in our country is an inconvenience then this is the way it should be. The one thing I think could be toned down is the listening in on our conversations that is violating our privacy. It is a shame when you have young people voluntarily going to join terrorists to be taught to kill whoever does not share the same ideals, beliefs or follow their laws.

Terrorism, drug trafficking and other forms of global organized crime are intertwined. Fighting terrorism includes targeting the global drug trade. Terror outfits are looking for financial opportunities to support their operations, the main concern of the United States seems to be the existing and potential links between the drug trade and terrorism. Sullum (2201) put it this way, "going after the illegal drug trade" is what allows terrorists to fund their operations with the artificial profits created by prohibition. He also goes on to say the US $40 - billion or so the United States spends on drug law enforcement represents a subsidy for murderers. This prohibition has contributed revenues to armed criminals around the world, including Bin Laden's organization which has benefitted indirectly from the drug trade by way of the opium money which supports his Taliban hosts in Afghanistan (Sullum, 2001). The war on drugs and the war on terrorism must be conducted simultaneously and Americans should be asking themselves which is scarier: a drug dealer selling an intoxicant to a willing buyer or a terrorist who murders people at random?

References

Bojanc, R., & Jerman-Blazic, B. (2013). A quantitative model for information-security risk management. Engineering Management Journal, 25(2), 25-37.
Sullum, J. (2001, Oct 16). Stop bombs, not drugs: Spending billions going after the illegal drug trade is not only ineffective, it wastes money that could be used more effectively in the war on terror.

Steph:

The information security policies and also the procedures. This is a four step process: The first one will be to identification and also the valuation of the information assets, the second one this is saying that the identification and also the assessment of the threats to the enterprise and also the information assets, the third one is talking about the identification and also the assessments of the vulnerabilities, then the very last one is saying that the determination of the countermeasure that have been and should be deployed, this will also include the cost-benefits and also the analysis of the feasibility of the implementing and also the countermeasure

I really don't think that the terrorist threat will ever stop anywhere, because of the fact that they will target everyone and anyone that isn't in a agreement and this is the way they want to do things. You can also see this kinda stuff on the news in the news papers.

What I found on the drug trafficking is that the terrorism this will be increasingly begin considered and this is also a very serious threat, this is also to state and also global security. Then the terrorism and also the narcotics trade, this has traditionally been treated as two different and also distinct threats and this is within security discourse. But in the 1990's the researchers and also the scholars they started to focus on the increasing association and this is between the organized crime also the terrorist organization. Then after the 9/11 attacks, the international community this will increasingly consider illicit drug trade and also terrorism and the two interconnected phenomena. But the major concerns is that the terrorist organization this can make us of drug trafficking networks and even generate funds for their arms and also equipment. But the U.S Department of the State there are fourteen out of thirty-six foreign terrorist organization they are involved in trafficking narcotics.

Request for Solution File

Ask an Expert for Answer!!
English: Respond to each seperatly with 100-150 words attached
Reference No:- TGS01063286

Expected delivery within 24 Hours